Frequently Asked Questions

Find answers to the most common questions about D-Secure File Eraser Network. If you can't find what you're looking for, contact our support team.

This FAQ section covers the top 20 questions we receive from D-Secure File Eraser Network users. Each answer provides detailed information and links to relevant sections of the manual for more in-depth guidance.

1

What does D-Secure File Eraser Network do?

D-Secure File Eraser Network is a comprehensive data erasure solution for network environments. It allows IT administrators to permanently erase files, folders, and digital traces from multiple networked computers simultaneously from a central console. The software uses advanced overwriting algorithms to ensure that deleted data cannot be recovered, even with sophisticated data recovery tools.

2

Does D-Secure really remove data beyond recovery?

Yes, absolutely. When you use D-Secure File Eraser Network with regulated erasure algorithms, the data is permanently destroyed and cannot be recovered. The software overwrites data multiple times with random patterns, making recovery impossible even with specialized forensic tools. All erasure standards used (DoD 5220.22-M, NIST 800-88, Gutmann, etc.) are industry-recognized and comply with international data destruction regulations.

3

Which erasure algorithm should I choose?

The choice depends on your security requirements and available time. For most business use: DoD 5220.22-M (3 passes) or DoD 7-pass provides excellent security with reasonable speed. For highly sensitive government or military data: Use Gutmann (35 passes) or DoD 7-pass for maximum security. For compliance with modern standards: NIST 800-88 Clear is recommended. For quick internal cleanups: 1-pass Zeroes is sufficient. Higher pass counts increase security but also increase the time required for erasure.

4

Why are administrator credentials required for domain connection?

Administrator credentials are necessary because D-Secure File Eraser Network needs elevated permissions to access remote computers on the network, read their file systems, and perform permanent erasure operations. Only domain administrators have the necessary rights to execute these operations across multiple computers. This security measure prevents unauthorized users from erasing data on network computers.

5

Should I check network connection status for all computers?

It's recommended to check network connection status before scheduling erasure tasks. This ensures that computers are online and accessible. However, you can skip this check if you're scheduling tasks for later execution. Offline computers will appear in the list but cannot be erased until they're reconnected to the network. The software automatically handles reconnections for scheduled tasks.

6

A computer was active but became inaccessible later—why?

This can happen for several reasons: the computer was turned off or went to sleep mode, network connectivity was lost, the computer was removed from the domain, firewall settings were changed to block access, or the user's session credentials expired. Check the computer's power status, network connection, and domain membership. If the issue persists, verify firewall rules and refresh your domain connection in the application.

7

Can I erase files on non-domain computers?

D-Secure File Eraser Network is specifically designed for domain environments and requires Active Directory integration. For standalone computers not joined to a domain, you would need to use the standalone version of D-Secure File Eraser. The network version relies on domain infrastructure for authentication, computer discovery, and remote access.

8

If a computer disconnects after scheduling a task, will the task still run?

Scheduled tasks are stored on each individual computer, not centrally. If a computer is offline when the scheduled time arrives, the task will execute when the computer comes back online (for tasks like 'Every Boot') or will be skipped for time-specific tasks. It's best practice to ensure computers remain connected for scheduled erasure tasks to execute as planned.

9

How do I activate if my server has no internet connection?

Use the offline activation method: Generate a Registration ID from the application, email it to techsupport@dsecuretech.com along with your Activation Key, receive a License Key file from support (usually within one business day), and import the License Key file into the application to complete activation. See the Licensing section for detailed step-by-step instructions.

10

How can I check which licenses are expiring soon?

Go to Activation → Manage Licenses. License pools that are expiring soon are highlighted with warning colors in the list. The interface shows the exact expiry date for each pool. You can sort by expiry date to see which licenses need renewal first. It's recommended to set calendar reminders 30 days before expiration.

11

Can I erase selective internet activity traces instead of all?

Yes, absolutely. When you click Erase Traces → Settings, you can choose exactly which types of internet activity to erase for each installed browser. Options include browsing history, cache, cookies, download history, saved passwords, form data, and more. You can also select specific browsers (Chrome, Firefox, Edge, etc.) rather than erasing traces from all browsers.

12

Why do some system traces persist even after erasure?

Some system traces may persist if: applications are currently running and have locked access to their trace files, you don't have sufficient permissions to erase certain system files, Windows is actively using the files, or the files are recreated immediately after erasure by running processes. Close all applications before erasing traces and ensure you have administrator privileges for best results.

13

Can I exclude specific files or folders from erasure?

Yes, use the Ignore File List feature. Go to Home → Settings → Ignore File List. Here you can add file types (extensions like .pdf, .docx), specific file names, or entire folder names. Any items matching the ignore list will automatically be skipped during erasure operations, even if they're selected. This protects critical files from accidental deletion.

14

Can I create duplicate task names for scheduled tasks?

No, each scheduled task must have a unique name. The software prevents duplicate task names to avoid confusion and management issues. Choose descriptive names like 'Daily Temp File Cleanup - Sales Dept' or 'Weekly Browser History Erasure - Legal' to clearly identify each task's purpose and scope.

15

How do I disable the confirmation dialog before erasure?

Go to Home → Settings → General Settings. Uncheck the option 'Confirm to Proceed' or 'Show Confirmation Dialog'. After disabling, erasure operations will begin immediately when you click the Erase button without showing a confirmation prompt. Use this feature only if you're confident in your selections, as it removes the final safety check.

16

Can I return or reuse a license from one computer to another?

Yes. Go to Activation → Manage Licenses, select the license pool, click View Computers, select the computer you want to deactivate, and click Deactivate License. This frees up one license in the pool that can be used to activate another computer. This is useful when replacing computers or redistributing licenses across your organization.

17

How do I get detailed erasure reports?

Erasure reports are automatically generated after every erasure operation. Access them by clicking Home → Reports. You can filter reports by date range and type (Erase Files & Folders or Erase Traces). Each report includes details like computer name, files erased, algorithm used, time taken, success/failure counts, and a unique Report ID for tracking.

18

Can I preview or save reports for compliance?

Yes. In the Reports section, select any report and click Action → Preview to view it on-screen. To save, select the report, click Save, choose PDF or XML format, select a destination folder, and click Save. PDF reports are formatted for printing and sharing, while XML reports can be imported into other systems for analysis.

19

Can I save multiple reports at once?

Currently, reports must be saved individually—you cannot batch-export multiple reports in one operation. To save multiple reports, select and save each one separately. Alternatively, you can send reports to D-Secure Cloud in batch, which provides centralized storage and management of all your erasure reports.

20

What should I do if I lose local reports?

If you've been uploading reports to D-Secure Cloud, you can access them from the Cloud Console at any time. If you haven't been using Cloud integration, local reports lost due to database corruption or system failure cannot be recovered. To prevent data loss: regularly back up your MariaDB database, enable D-Secure Cloud integration and upload reports regularly, export critical reports to PDF and store in a separate location, and configure automated database backups as part of your IT maintenance routine.

Still Have Questions?

If your question isn't answered here, we're here to help! Our support team is available through multiple channels.

Email Support

Send detailed questions to our technical support team.

techsupport@dsecuretech.com

Knowledge Base

Browse articles, tutorials, and troubleshooting guides.

Visit Knowledge Base →

Live Chat

Chat with a technician for real-time assistance.

Start Chat →

Quick Links to Related Topics